Role of Attention and Design Cues for Influencing Cyber-Sextortion Using Social Engineering and Phishing Attacks

被引:5
作者
Pethers, Brent [1 ]
Bello, Abubakar [1 ]
机构
[1] Western Sydney Univ, Sch Social Sci, Penrith, NSW 2751, Australia
关键词
cybersecurity; privacy; sextortion; phishing; social engineering;
D O I
10.3390/fi15010029
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber sextortion attacks are security and privacy threats delivered to victims online, to distribute sexual material in order to force the victim to act against their will. This continues to be an under-addressed concern in society. This study investigated social engineering and phishing email design and influence techniques in susceptibility to cyber sextortion attacks. Using a quantitative methodology, a survey measured susceptibility to cyber sextortion with a focus on four different email design cues. One-way repeated measures ANOVA, post hoc comparison tests, Friedman nonparametric test, and Spearman correlation tests were conducted with results indicating that attention to email source and title/subject line significantly increased individuals' susceptibility, while attention to grammar and spelling, and urgency cues, had lesser influence. As such, the influence of these message-related factors should be considered when implementing effective security controls to mitigate the risks and vulnerabilities to cyber sextortion attacks.
引用
收藏
页数:19
相关论文
共 36 条
  • [21] Pattinson Malcolm, 2012, Information Management & Computer Security, V20, P18, DOI 10.1108/09685221211219173
  • [22] PETTY RE, 1984, ADV CONSUM RES, V11, P668
  • [23] Understanding Scam Victims: Seven Principles for Systems Security
    Stajano, Frank
    Wilson, Paul
    [J]. COMMUNICATIONS OF THE ACM, 2011, 54 (03) : 70 - 75
  • [24] Suganya V., 2016, INT J COMPUT APPL, V139, P20, DOI 10.5120/ijca2016909084
  • [25] Tabachnick BG., 2014, USING MULTIVARIATE S
  • [26] Tsow A., 2007, TR649 IND U
  • [27] Reflections on past behavior: A self-report index of habit strength
    Verplanken, B
    Orbell, S
    [J]. JOURNAL OF APPLIED SOCIAL PSYCHOLOGY, 2003, 33 (06) : 1313 - 1330
  • [28] Suspicion, Cognition, and Automaticity Model of Phishing Susceptibility
    Vishwanath, Arun
    Harrison, Brynne
    Ng, Yu Jie
    [J]. COMMUNICATION RESEARCH, 2018, 45 (08) : 1146 - 1166
  • [29] Habitual Facebook Use and its Impact on Getting Deceived on Social Media
    Vishwanath, Arun
    [J]. JOURNAL OF COMPUTER-MEDIATED COMMUNICATION, 2015, 20 (01): : 83 - 98
  • [30] Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model
    Vishwanath, Arun
    Herath, Tejaswini
    Chen, Rui
    Wang, Jingguo
    Rao, H. Raghav
    [J]. DECISION SUPPORT SYSTEMS, 2011, 51 (03) : 576 - 586